Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalSecurity Education & TrainingPhysical Security

Determining the Credibility of Online Threats in a World of Digital Noise

By Bob Innes
Stressed woman at laptop
Elisa Ventur via Unsplash
October 30, 2025

In today’s hyperconnected world, online threats surface daily across websites, social media platforms and anonymous forums. While many are nothing more than idle chatter, pranks or cries for attention, others are chillingly real — and the challenge is determining which is which before tragedy strikes.

I learned this firsthand as the webmaster of RentAHitman.com, a website that has traveled a very unusual path. When I originally registered the domain in 2005, it was intended for an IT startup — “Rent” as in hire us, “Hit” referring to network traffic and analytics, and “Men” representing the four of us who were launching a penetration testing business. When the business plan failed, the site sat dormant for years. Eventually, I retooled it into what it is today: a parody look at what a corporate murder-for-hire website might look like, complete with Terms & Conditions, disclaimers, and even a backlink to IC3.gov (the FBI’s Internet Crime Complaint Center).

What started as satire unexpectedly became a public-safety tool. Over the past 15 years, RentAHitman.com has intercepted hundreds of real requests for violence. Some were laughably absurd, but many were serious enough to warrant police involvement. The site has since been linked to over 200 investigations involving state, federal, and international agencies, leading to arrests and convictions — and, most importantly, saving well over 170 lives.

The biggest question I face is simple yet urgent: how do you separate a credible threat from the digital noise?

From my experience collaborating with law enforcement, credibility often hinges on:

  • Specific details. A name, location, phone number or financial offer signals far more credibility than vague “I want someone gone” statements.
  • Digital breadcrumbs. IP addresses, email accounts, social media handles and metadata can either validate or disprove intent.
  • Behavioral patterns. Repeated contact attempts, urgency or escalation in tone often indicate higher risk.
  • Context and corroboration. Even small details can connect to larger investigative databases, ongoing cases or known offenders.

While this triage is critical for investigators, there’s another equally important layer that can’t be ignored: education and prevention.

The Role of Online Safety Education

Not everyone is prepared for what they encounter online. Children and adults alike are vulnerable to scams, harassment and predatory solicitations that can spiral into real-world danger. Online safety education is no longer optional — it’s a core part of crime prevention and community resilience.

Teaching children to think critically about what they click, what they share, and who they engage with online can mean the difference between a safe digital experience and one that ends in harm. Adults, too, often lack awareness of the dangers: oversharing personal details, trusting unverified websites, or assuming “it can’t happen to me.”

As professionals, we have a collective responsibility to help educate and safeguard both children and adults in this digital age. That means schools, parents, workplaces, and law enforcement working hand-in-hand to create awareness campaigns, integrate safety lessons into curricula, and provide resources for those who encounter threats online.

Mental Health and Online Behavior

Equally important is recognizing the link between mental health and online threats. Many of the solicitations that come across my site reflect desperation, untreated trauma or cries for help. Sometimes, what looks like a threat is really a signal of distress. Other times, mental health struggles manifest as violent ideation directed at self or others.

Building systems of support — early intervention, accessible counseling, peer outreach — helps address root causes before they escalate into crises. When people feel seen and supported, they’re less likely to turn to destructive paths online.

Cyberbullying Education and Prevention

One area that has grown especially concerning is cyberbullying. What used to be limited to playgrounds or hallways now follows children home, 24/7, through their devices. Victims of bullying often see no escape, and tragically, many threats submitted to my site involve children attempting to hire someone to “make a bully disappear.”

This underscores the urgent need for cyberbullying education — not only for children, but for parents, teachers, and administrators. Everyone in a child’s life should understand how online harassment works, how to recognize warning signs, and how to intervene safely.

The Bigger Picture: Crime Prevention in the Digital Era

Over the past 15 years, RentAHitman.com has been connected to more than 200 investigations across the U.S. and abroad. Collaborations with state police agencies, federal task forces, and international law enforcement partners have prevented school shootings, domestic violence, and targeted assaults. Lives have been saved — not by chance, but because online threats were taken seriously, investigated thoroughly, and acted upon in time.

The lesson is clear: we cannot afford to dismiss online threats as “just jokes” or “teen drama.” Every submission deserves scrutiny. Every digital breadcrumb is a lead. And every child or adult deserves the tools to navigate this landscape safely.

The digital world isn’t going away — it’s only expanding. As security professionals, educators, and community leaders, it’s our job to stay ahead of the threats, invest in online safety education, prioritize mental health, and treat cyberbullying as the serious issue it is. Together, we can transform a chaotic online environment into one where safety, awareness, and prevention are the norm.
KEYWORDS: online security student safety threat evaluations

Share This Story

Bob innes headshot

Bob Innes is a security practitioner, investigator, and longtime online safety advocate whose work sits at the intersection of physical security, cybersecurity, and public-safety outreach. Image courtesy of Innes

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

critical event management

Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing